Questions tagged [spoofing]

In networking, the term 'spoofing' is used to describe a variety of ways in which hardware and software can be fooled. There are various kind of spoofing such as IP spoofing, MAC spoofing, E-mail address spoofing, Caller ID spoofing, GPS Spoofing etc.

In networking, the term spoofing is used to describe a variety of ways in which hardware and software can be fooled. There are various kind of spoofing such as IP spoofing, MAC spoofing, E-mail address spoofing, Caller ID spoofing, GPS Spoofing etc.

IP spoofing involves trickery that makes a message appear as if it came from an authorized IP address. In computer networking, the term IP address spoofing or IP spoofing refers to the creation of Internet Protocol (IP) packets with a forged source IP address with the purpose of concealing the identity of the sender or impersonating another computing system.

MAC spoofing is a technique for changing a factory-assigned Media Access Control (MAC) address of a network interface on a networked device.

E-mail address spoofing is an act of forging an e-mail header to make it appear as if it came from somewhere or someone other than the actual source. This technique is commonly used by spammers to hide the origin of their e-mails and leads to problems such as misdirected bounces.

Caller ID spoofing is the practice of causing the telephone network to display a number on the recipient's Caller ID display that is not that of the actual originating station.

A GPS spoofing attack attempts to deceive a GPS receiver by broadcasting a slightly more powerful signal than that received from the GPS satellites, structured to resemble a set of normal GPS signals. These spoofed signals, however, are modified in such a way as to cause the receiver to determine its position to be somewhere other than where it actually is, specifically somewhere determined by the attacker.

324 questions
8
votes
2 answers

How to understand and reduce IP spoofing attack errors in a Rails application?

I'm getting lots of emails from my error reporting service about IP spoofing attacks with increasing frequency. If I understand correctly, this occurs when the request sets an HTTP header specifying that the IP address the request is coming from was…
Andrew
  • 227,796
  • 193
  • 515
  • 708
8
votes
2 answers

Html Agility Pack, Web Scraping, and spoofing in C#

Is there a way to spoof a web request from C# code so it doesn't look like a bot or spam hitting the site? I am trying to web scrape my website, but keep getting blocked after a certain amount of calls. I want to act like a real browser. I am…
Mike Flynn
  • 22,342
  • 54
  • 182
  • 341
7
votes
2 answers

Spoofing HTTP Referrer data using ASP.NET

Answers on here and various other sites are often full of warnings not to trust HTTP Referrer headers because they are 'so easily' spoofed or faked. Before I go any further - no, I'm not up to no good - but I do want to run some referrer-dependant…
Widor
  • 13,003
  • 7
  • 42
  • 64
7
votes
2 answers

How to route TCP/IP responses through a different interface?

I have two machines each with two valid network interfaces, an Ethernet interface eth0 and a tun/tap interface gr0. The goal is to start a TCP connection on machine A using interface gr0 but then have the responses (ACKs, etc) from machine B come…
Mr. Shickadance
  • 5,283
  • 9
  • 45
  • 61
7
votes
4 answers

Reason to use more cookies than just a session hash for authentication?

I usually hang out in a community that uses a bulletin board software. I was looking at what this software saves as cookie in my browser. As you can see it saves 6 cookies. Amongst them, what I consider to be important for authentification…
dierre
  • 7,140
  • 12
  • 75
  • 120
7
votes
2 answers

How to Capture Remote System network traffic?

I have been using wire-shark to analyse the packets of socket programs, Now i want to see the traffic of other hosts traffic, as i found that i need to use monitor mode that is only supported in Linux platform, so i tried but i couldn't capture any…
Player_Neo
  • 1,413
  • 2
  • 19
  • 28
6
votes
2 answers

Application Security Concerns: How easy is it to fake an IP-Address?

I am dealing with an application that is protected by a firewall and only allows access from certain IP-Addresses (which are application webservers). Its a bit delicate and it would be much hassle to introduce another authentication/protection…
The Surrican
  • 29,118
  • 24
  • 122
  • 168
6
votes
2 answers

Send Raw IP packet in C#, everything above the ethernet layer

I don't want to modify the ethernet portions of the frame, but I need to modify the IP packet and the data portion of the frame. I try sending a raw frame and it still puts in the IP information. I basically need to send a frame without defining…
brandon
  • 1,230
  • 3
  • 13
  • 31
6
votes
1 answer

Prevent X-Forwarded-For spoofing using ELB and Node

I'm analyzing a stack of a public route that rests on an Elastic Load Balancer which opens a port exposed by PM2 that starts a node app using the koa module. At the moment, the IP is logged and that depends solely on the X-Forwarded-For header. If…
SomeGuyOnAComputer
  • 5,414
  • 6
  • 40
  • 72
6
votes
1 answer

Spoof or fake location on Android phone

I've been trying to get this to work for a few days without success. Basically, I'm writing a small test app to make the phone report it's position as somewhere else using addTestProvider and setTestProviderLocation etc. Basically it looks fine…
m0thman
  • 61
  • 1
  • 1
  • 2
6
votes
2 answers

How to prevent spoofing of iBeacons?

As far as I can tell, there is nothing to restrict any developer from programming their beacon to use a particular UUID, major, minor or identifier. In the event I create an iBeacon with a UUID of "foo", what is to prevent another developer of…
Rahul Iyer
  • 19,924
  • 21
  • 96
  • 190
5
votes
2 answers

How can I spoof the user agent of a JavaScript GET request?

How can I spoof the user agent of a JavaScript GET request? setRequestHeader with User-Agent isn't allowed: xmlHttpRequest.setRequestHeader("User-Agent", "...");
XP1
  • 6,910
  • 8
  • 54
  • 61
5
votes
2 answers

How to Spoof ip in java

How to change tcp information in layer 3 in java ?(ip spoofing) how to change layer 2 information ? is there any good library for it in java ? it need raw socket?
Sajad Bahmani
  • 17,325
  • 27
  • 86
  • 108
5
votes
6 answers

How do you combat website spoofing/phishing?

What is your suggested solution for the threat of website UI spoofing?
Assaf Lavie
  • 73,079
  • 34
  • 148
  • 203
5
votes
5 answers

How to prevent HTTP Spoofing?

We have created a database driven website using PHP with set cookies and now need to prevent HTTP spoofing, any ideas on how to do this? we are beginners with this so any help would be greatful
Jermain
  • 53
  • 1
  • 3
1
2
3
21 22